Identifying a Malicious Node in a UAV Network.
Aviram ZilbermanAriel StulmanAmit DvirPublished in: IEEE Trans. Netw. Serv. Manag. (2024)
Keyphrases
- malicious nodes
- network structure
- wireless sensor networks
- computer networks
- peer to peer
- intermediate nodes
- path length
- network management
- network model
- communication networks
- dynamic environments
- network nodes
- small world networks
- complex networks
- overlapping communities
- neighboring nodes
- residual energy
- malicious behavior
- wavelength division multiplexing